Enjoy Life
Enjoy Life

Is it accurate to say that you are looking for vault party pills? There are numerous nations that-have announced them unlawful and perhaps your nati

How to fix the error in Norton Mobile Security app?
How to fix the error in Norton Mobile Security app?

Norton Mobile Security is a powerful app to protect your Smartphone from being stolen and possible cyber attacks. Moreover, it remotely locates your

Preventing SQL Injection
Preventing SQL Injection

If you generate dynamic SQL queries based on user input, an attacker could inject malicious SQL commands that can be executed by the database.In this

Sql Injection
Sql Injection

SQL injection is an attack in which malicious code is inserted into strings that are later passed to an instance of SQL Server for parsing and executi

Cross site scripting.
Cross site scripting.

Hi..... In this blog I will tell you that what is cross site scripting and how to implemet some validation rule so that we prevent cross site scripting.

What is Cookie poisoning?
What is Cookie poisoning?

Cookie poisoning is a known technique mainly for achieving impersonation and breach of privacy through manipulation of session cookies, which maintain

Implementing Cryptography by using MD5 algorithm.
Implementing Cryptography by using MD5 algorithm.

In last blog I had explained that how to implement cryptography by using SHA1 algorithm. In this article I will describe another method to implement c

Implementing Cryptography in C#.NET by using SHA1 Algorithm.
Implementing Cryptography in C#.NET by using SHA1 Algorithm.

We can use cryptography to secure our data from users over the network. We can implement cryptography in C# by using System.Security.Cryptography name